Cryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Randomization is used in the encoding of DNA and in the scrambling of RNA to make each encryption instance different from the other. This method was tested with varying sizes of messages, and it has proved very efficient in terms of time between encryption and decryption. This approach has created new opportunities for the creation of new classes of secure cryptographic systems bio-inspired to get modern methods of digital communication.
Lignin has emerged as a promising asphalt binder modifier due to its sustainable and renewable nature, with the potential to improve flexible pavement performance. This study investigates the use of Soda Lignin Powder (SLP), derived from Pinus wood sawdust via alkaline treatment, as an asphalt modifier to enhance mixture durability. SLP was characterized using Fourier Transformation Infrared Spectroscopy (FTIR), X-ray Diffraction (XRD), and Scanning Electron Microscopy with Energy Dispersive X-ray Analysis (SEM/EDX), revealing significant changes in its chemical structure post-extraction. These analyses showed the presence of phenolic units, including hydroxyphenyl propane, syringyl, and guaiacyl units. The morphology of SLP was identified
... Show MoreThe book gives details about the healing power of love
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe creative production of the philosophy of beauty in artistic works constitutes a step towards development and progress by meeting the growing and changing needs of humanity according to various factors, including those related to the human situation and others related to technical outputs, as well as the multiplicity of the field for the emergence of new artistic currents and movements concerned with graphic production and communication and communication processes that It is associated with imagination and freedom from social and cultural constraints, in which the design production seeks to link more realistic intellectual contents with the achievements of the creative artwork as a communication system to involve the recipient (the vi
... Show MoreThis research dealt with the process of reducing costs through some strategic methods of management accounting targeted cost analysis unassembled and Alkeisen, where he focused this research through his theory on a review of some administrative accounting strategic technologies, while the second practical side through the application of targeted cost analysis unassembled and Alkeisen, acquired Search importance of focusing on the decisions to cut costs, through the use of some administrative accounting strategic methods and this we can unassembled analysis, continuous improvement, and the cost of quality) when applied quality, "in light of this has been reached to a set of conclusions that the most important of the company's relian
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreDuring the last two decades, nanomaterial application has gained a significant attraction into asphalt technology due to their effect in enhancing asphalt binder improving the asphaltic mixture. This study will modify the asphalt binder with two different nano types, nano SiO2 and CaCO3, at levels ranging from 1% to 7%. The resulting optimum nano-modified Asphalt will be subject to a series of rheological tests, including dynamic shear rheometer (DSR), Viscosity, and bending beam rheometer (BBR) to determine asphalt binder sensitivity towards low-medium-high temperature range. Results indicate that both nano types improved the physical characteristics of Asphalt, and 5% by weight of Asphalt was suggested as a reasonable dosage of nano-SiO2
... Show MoreThe Quiet American could be considered as one of Graham Greene’s most distinguished books; it is an epochal novel written during the phase of the cold war between the United States and the Soviet Union. The novel deals with the interference of the United States in Vietnam ten years before Vietnam’s war. The role the Americans played in arousing an inner political crisis in the country previous to her military invention. The book reflects that this action was not out of American government concern about Vietnamese people themselves but merely a political foreign affair. They wanted to stop communism from spreading widely and reducing its role in the East. This paper attempts to analyse the novel concentrating on the message Greene intend
... Show MoreCompression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show More